0% found this document useful (0 votes)
84 views2 pages

Etc Pyq

Uploaded by

aztec.sapphire11
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
84 views2 pages

Etc Pyq

Uploaded by

aztec.sapphire11
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 2
22ETC151/251 Model Question Paper-I/II with effect from 2022-23 (CBCS Scheme) USN First/Second Semester B.E. Degree Examination Introduction to Cyber Security (22ETC151/251) TIME: 03 Hours Max. Marks: 100 Note: Answer any FIVE full questions, choosing at least ONE question from each MODULE. *Bloom’s ote aie a ‘eve Sar [Dat copter Sine Da nt Ck nd Cr as b © Ete aos einer Ry aT dion tr 3 | is ane TATA 2 a 3 | 264, [84 oR OE [| ORR aITT Ta mTONRE. 5 | | 1 is aC an a4 se pad Sangam TAS 7> 3] az ‘eae Sar [= [ar Socal Ergin? Dec nan Bas Sl Eginenng waka] ES siabiecamnle 6) P62, [163 1 ipa aw Sa a ai Li pass vane PTZ | ‘cyber crimes £44 50) 64 : ©] aa api yap and FNC gE |] seperti CG OR : QOt Ta | Define Cyber Stalking along with its working, En eo Sas a z £2 1 ize bean pave aac and The aS naa oie Cae =| a a Wi, are YY TE _Modute-3 i = —_] 05] Whar frre ey gga Aa Tey Tagen Lie avanapsso?™ LZ | wassup a.G 1 Wha roy save WHat pr a 129 PI24 Page 01 of 02 22ETC1S1/251 55a fr Backor? Discuss ay Tour examples oF Backdoor Trojans ? 1D, é = ———— 1! oR US. z BE Ta | Discuss various types of Viruses ‘categorized based on attacks on various 13 8 elements of the system PI4’G is fishing? How fishing works? >, ~ [ts 6 | What is Fishing’ 7" PBL, Pre 15 [Discuss our ppes of DoS attacks: 12 é i Module-t G7 Te [Expinn Tour pes of metiods used by the phishers to revel personal 2 10 information on tnternet 213 —1p | Discuss various types of Phishing Seams v 22 ae To OR Ga] J Discuss the various techniques used By Phishers to Taunch Phishing aie ne 10 1 | Discuss various types of Kdentity Thelt techniques. 3 10 6247128 Modules we ig phases of Forensics life eycles i fication ii) Collection and Recording P26 7398 1 [Lis various Computer Forensics services available, explain any two ofthems | C2, 6 Briefly explain RFC2822 = i riefly explain 4 x P362— TO ]@ ] Discuss the following phases of Forensics life cycle iz 0 i) Storing and Transporting ii) Examination/Investigation 2 6 2 896. | Discuss the need for concept of Computer Forensics Pane i = © | Briefly explain Network Foren: 0 7 7 “Bloom's Taxonomy Level: Indicate as L1, L2, L3, L4, etc. It is also desirable to indicate the COs and POs to be ‘tained by every bit of questions.

You might also like